Date post: | 07-Jul-2015 |
Category: |
Engineering |
Upload: | ajnish-rana |
View: | 160 times |
Download: | 3 times |
What is Crime??? ?
An action or omission that constitutes an offense
that may be prosecuted by the state and is
punishable by law.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
What is Cyber Crime??? ?Crime committed using a computer and the internet to steal a person's
identity or sell contraband or stalk victims or disrupt operations with
malevolent programs..
Cyber Crime is emerging as a serious threat.
Threatening Email, Assuming someone's Identity, Sexual
Harassment, Defamation, Spam and Phishing are some examples
where computers are used to commit crime.
Viruses, Worms and Industrial Espionage, Software Piracy and
Hacking are examples where computers become target of crime.
Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year.
Hacker Hacker (programmer subculture), who combines excellence,
playfulness, cleverness and exploration in performed activities.
Kevin David Mitnick is first hacker.
Cyber Squatting :- Cyber Squatting is the act of registering a famous Domain
Name and then selling it for a fortune.
Phishing :-
Phishing is just one of the many frauds on the Internet, trying to
fool people into parting with their money.
Phishing refers to the receipt of unsolicited emails by customers of
Financial Institutions, requesting them to enter their Username,
Password or other personal information to access their Account for
some reason.
The fraudster then has access to the customer's online bank
account and to the funds contained in that account.
How it Works ??? ?
Cyber Stalking :-
Cyber Stalking is use of the Internet or other electronic
means to stalk someone.
This term is used interchangeably with online harassment
and online abuse.
Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly, such as
following a person, appearing at a person's home or place
of business, making harassing phone calls, leaving written
messages or objects, or vandalizing a person's property.
Vishing :-
Vishing is the criminal practice of using social engineering and
Voice over IP (VoIP) to gain access to private personal and
financial information from the public for the purpose of
financial reward.
The term is a combination of “Voice" and phishing.
Vishing exploits the public's trust via landline telephone
services.
Vishing is typically used to steal credit card numbers or other
information used in identity theft schemes from individuals.
Indian Crime Scene
The major Cyber Crimes reported, in India, are Denial of
Services, Defacement of Websites, Spam, Computer Virus
and Worms, Pornography, Cyber Squatting, Cyber Stalking
and Phishing.
Given the fact that nearly $ 120 million worth of
Mobiles are being lost or stolen in the country every year.
Nearly 69 per cent of information theft is carried out
by current and ex-employees and 31 per cent by
hackers.
Top Countries in Cyber Crime :-
India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
Why India??? ?
121 Million Internet Users
65 Million Active Internet Users, up by 28% from 51
million in 2010
50 Million users shop online on Ecommerce and Online
Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to Data
Packages.
A rapidly growing online user base
The majority of cybercrimes are centered on forgery, fraud and Phishing,
India is the third-most targeted country for Phishing attacks after the US
and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010.
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010).
India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported.
Cyber Laws in India
The Information Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with computer system
Whoever with the Intent to cause Wrongful Loss or Damage to the public or
any person Destroys or Deletes or Alters any Information Residing in
Computer Resource or diminishes its value or utility or affects it injuriously by
any means, commits hack
Whoever commits hacking shall be punished with imprisonment up to three
years, or with fine which may extend up to two lakh rupees, or
with both.
Whoever without permission of the owner of the computer :-
• Secures Access, Downloads, Copies or extract any data, computer database or any information;
• Introduce or causes to be introduce any Virus ContaminantShall be liable to pay damages by way of compensation not exceeding
one crore rupees to the person so affected.
Information Technology
Amendment Act, 2008 Section – 43,
Destroys, Deletes or Alters any Information residing in a
computer resource or diminishes its value or utility or
affects it injuriously by any means.
Steals, conceals, destroys or alters any computer source code with an intention to cause damage;
Punishment for sending offensive messages through communication service, etc.
Punishment for identity theft
Punishment for cheating by personation by using computer resource
Punishment for violation of privacy.
Arrest And Reports For Cyber Crime in India
o Under the IPC, 356 cybercrime cases were registered
in 2010 (276 cases in 2009)
o Geographic breakdown of cases reported
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
o The majority of these crimes were either forgery or
fraud cases.
Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009).
233 persons were arrested in 2010.
33% of the cases registered were related to hacking
How to Tackle Such activity??? ?An important question arises that how can these crimes be
prevented. A number of techniques and solutions have been
presented but the problems still exists and are increasing day by
day.Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses
and other malicious software.
Anti spywares are used to restrict backdoor program, trojans
and other spywares to be installed on the computer.
Firewalls:protects a computer network from unauthorized access.
may be hardware devices, software programs, or a
combination of the two. typically guards an internal computer
network against malicious access from outside the network.
Cryptography:
Cryptography is the science of encrypting and decrypting
information. Encryption is like sending a postal mail to
another party with a lock code on the envelope which is known
only to the sender and the recipient. A number of
cryptographic methods have been developed and some of them
are still not cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop
cyber crimes.
Security Software like Anti Viruses and Anti SpyWares should
be installed on all computers.
Internet Service Providers should also provide high level of
security at their servers.
The Future of Cyber-Crimes in India
Continued Website Hacks and Defacements
Data and Information theft
Increasing phishing attacks on Ecommerce and
Financial Websites
Cybercriminals targeting Social and
Professional Networks
Threats directed at the Mobile Platform:
Smartphones and Tablets
Conclusion:-
Indian Laws are well drafted and are capable of
handling all kinds of challenges as posed by
cyber criminals. However, the enforcement
agencies are required to be well versed with the
changing technologies and Laws.”
As internet technology advances so does the
threat of cyber crime. In times like these we
must protect ourselves from cyber crime. Anti-
virus software, firewalls and security patches
are just the beginning. Never open suspicious e-
mails and only navigate to trusted sites.”